Showing 385 open source projects for "java swing"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    Compute shared RSA keys for two parties using Gilboa's protocol. Other protocols may be added. Contains JAVA source for Benaloh, Naccache-Stern and Goldwasser-Michali crypto-algorithms. Oblivious transfers and BiPrimaliy tests also implemented.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    FragMend is a GUI tool that allows a forensic investigator to classify and view sectors of raw or unallocated data. The sectors can then be ordered and grouped into files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    winKnocks is an encrypted(DES) port knocking tool. Knock sequences are defined through XML files; users specify: number of packets of each knock sequence, payload and header of each packet. Logging capability. Generation of smoke packets.No replay-attack
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Open Source Security System for home users as well as for system administrators. Aims at providing an uniform security platform, Operating System Independent, to protect and prevent valuable data from corruption/stealling and destruction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    An electronic votingsystem – Verifiable E-Voting (VEV) – with underlying protocol to help secure the election process from malicious practices at the same time as allowing voters and candidates to verify the correctness of their votes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Java SWING applet to store encrypted files in your box.net account
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Zeitline is a Java/Swing tool that allows a computer forensic investigator to import events from various sources of a computing system or network and then order and classify them into one or more timelines of events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Portable and simple program for text and files encryption (Symmetric, Asymmetric and Steganography)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    CivilAction lets you create a Choose Your Own Adventure type story that can be played on Java enabled cell phone. A desktop application lets you write story files. People run the story on their phone. Make a 'Tresure hunt' or 'Amaze Race' type game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    SIMRAN adds security to the famous AODV protocol. The project is based on SAODV draft and AODV RFC.Its basic functionality lies in securing the AODV protocol by authenticating the non-mutable fields of the routing message using digital signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    RevolvingProxy is a cross platform HTTP Proxy application that is designed to be installed on a server that has been assigned multiple IP addresses. Each connecting client is assigned a different IP address for security testing or other purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A java application for creating, playing and solving SuDoku puzzles of various types. Features both a Swing GUI and command-line operation. The automatic solving of puzzles uses "smart" techniques rather than a brute force search of every possibility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SAFE Reports is a reporting/audit tool for SiteMinder® Policy Store, a popular Single Sign-On product. Find ease of generating reports from large policy data in seconds! Reports can be exported to major popular formats like HTML, word doc PDF and excel
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Authorization Component for Java based programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Distributed rainbow table generating
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A cryptographically secure instant messaging application. All packets sent by this program are encrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Quickly encrypt and decrypt your files with Petri. View encrypted text and image files containing your passwords or other sensitive information. Petri is written in Java and therefore runs on any operating system supporting the Java Runtime Environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Awesum2 is a graphical checksum verification utility written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Java Based Cryptographic P2P Messaging Client, is based on a client-server architecture. The Client is made in SWING. The server is text based. Server keeps tabs on presense and the users public keys. Presentation: http://varun.accosted.net/talks.php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Pure-Java cryptographic calculator, featuring basic arithmetic operators, cryptographic operations, multiple key file formats and edition of ASN.1 object files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Sonate is a java GUI for OpenBSD pf packet filtering. Optional code can be compiled to OpenBSD host to transfer generated configuration using SSL
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    CryptoHelper is a Java program designed to aid in the decryption of classical ciphers, ie pre WWII ciphers. It brings together tools like frequency analysis, friedman tests, enciphering/deciphering for several clasical ciphers, and brute force algorithm
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    bookHexor use the key.txt for encoding where is saved an arbitrary text, which is used as key. bookHexor read the key.txt and notice for each character, where it can be found as an index. If you encode text each of your charakters is displayed as index.
    Downloads: 0 This Week
    Last Update:
    See Project